Genel, Güvenlik
Fortigate Multiple İnterfaces Policies Nedir ?

Fortigate Multiple İnterfaces Policies Nedir ?

Herkese Merhaba,

Fortigate’ in Multiple İnterfaces Policies özelliğinden bahsedeceğiz. Ne işimize yarar diye düşünürsek normalde source ve destination interface eklediğimiz kuralları düşünün ve onu sources ve destinations olarak değiştirelim kısaca kural kalabalığından kurtarıyor diyebiliriz.

Dezavantaj olarak ise (makalenin sonunda farkı göstereceğim) kural ekranımızdaki default ta gelen INTERFACE PAIR görünümünü kapatıyor ve BY SEQUENCE moduna geçiyor. Çünkü kuralımız tek bir interface olmayacağı için bu ayarlama yapılamıyor.

Örnek olarak bir yere VPN vermek istiyorsunuz. Port1 ve Port2 interfaceleri ayrı networkler olduğunu düşünelim. Bunun için VPN to Port1 ve VPN to Port2 diye 2 ayrı kural yapmam lazım. Bu anlatacağım özellik sayesinde tek kural ile VPN to Port1 and Port2 yapabiliyor olacağım ve tek kural da işimi çözmüş olacağım .

Nasıl yapıldığına geçelim;

İlk olarak System > Feature Select sayfasına gelip MULTIPLE INTERFACE POLICIES özelliğini aktif ediyoruz.

Bunu yaptıktan sonra yeni bir kural oluşturuyoruz.

Gördüğünüz gibi birden fazla source ve destination interface e sahip bir kural oluşturduk ok diyerek kaydediyoruz.

Ve gördüğünüz gibi kuralımız belirlediğimiz portlarla oluştu.

İşinize Yaraması Dileğiyle..

BY SEQUENCE görünümü

INTERFACE PAIR görünümü

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • New Chrome 0-day Under Active Attacks – Update Your Browser Now
    by [email protected] (Swati Khandelwal) on 21 Ekim 2020 at 16:27

    Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to […]

  • Popular Mobile Browsers Found Vulnerable To Address Bar Spoofing Attacks
    by [email protected] (Ravie Lakshmanan) on 21 Ekim 2020 at 07:12

    Graphic for illustration Cybersecurity researchers on Tuesday disclosed details about an address bar spoofing vulnerability affecting multiple mobile browsers, such as Apple Safari and Opera Touch, leaving the door open for spear-phishing attacks and delivering malware. Other impacted browsers include UCWeb, Yandex Browser, Bolt Browser, and RITS Browser. The flaws were discovered by Pakistan […]

  • Windows GravityRAT Malware Now Also Targets macOS and Android Devices
    by [email protected] (Ravie Lakshmanan) on 20 Ekim 2020 at 14:02

    A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact […]

  • Download Ultimate 'Security for Management' Presentation Template
    by [email protected] (The Hacker News) on 20 Ekim 2020 at 13:41

    There is a person in every organization that is the direct owner of breach protection. His or her task is to oversee and govern the process of design, build, maintain, and continuously enhance the security level of the organization. Title-wise, this person is most often either the CIO, CISO, or Directory of IT. For convenience, we'll refer to this individual as the CISO. This person is t […]

  • U.S. Charges 6 Russian Intelligence Officers Over Destructive Cyberattacks
    by [email protected] (Ravie Lakshmanan) on 20 Ekim 2020 at 06:04

    The US government on Monday formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses. The individuals, who work for Unit 74455 of the Russian Main Intelligence Directorate (GRU), have been accused of perpetrating the "most disruptive and destructive series of computer attacks […]